
Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Linux Administration, Incident Response, Vulnerability Scanning, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Network Monitoring, Bash (Scripting Language), Cyber Security Assessment, Network Security, Anomaly Detection, Incident Management, AI Security, Information Systems Security, Network Analysis
Intermediate · Professional Certificate · 3 - 6 Months

LearnKartS
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Penetration Testing, Vulnerability Scanning, Security Testing, Cyber Security Assessment, Cybersecurity, Network Security, Cyber Attacks, Cryptography, Kubernetes, Application Security, Cloud Infrastructure, Cloud Applications, Cyber Security Strategy, Cyber Threat Intelligence, Cyber Threat Hunting, Security Controls, Security Awareness, Cyber Risk, Security Strategy
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Security Awareness, Cybersecurity, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Security Strategy, Cyber Risk, Authorization (Computing), Malware Protection, Authentications, Security Controls, Risk Management Framework, Identity and Access Management, Data Management, Cryptography
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Bash (Scripting Language), Operating Systems, File Systems, Linux Commands, Linux, SQL, Linux Administration, Unix Commands, File Management, Unix Shell, Query Languages, Database Management, Command-Line Interface, Relational Databases, Authorization (Computing), Authentications, User Accounts
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploit development, Vulnerability Scanning, Malware Protection, Exploitation techniques, Database Management, Cyber Security Assessment, Security Testing, Cyber Threat Intelligence, Cyber Operations, Vulnerability Assessments, Brute-force attacks, Cryptography, Cybersecurity, Intrusion Detection and Prevention, Hardening, Linux, Linux Administration
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Compliance Management, Regulatory Compliance, Compliance Reporting, Business Ethics, Law, Regulation, and Compliance, Ethical Standards And Conduct, Regulatory Requirements, Lending and Underwriting, Financial Industry Regulatory Authorities, Risk Control, Consumer Lending, Operational Risk, Risk Management Framework, Financial Regulations, Legal Risk, Business Risk Management, Risk Management, Case Studies, Financial Services
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: AI Security, Penetration Testing, Exploit development, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), Security Testing, Cyber Security Assessment, Cyber Operations, Computer Security, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Server Side, Web Applications, Machine Learning Algorithms
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Linux Administration, Bash (Scripting Language), Network Monitoring, Cyber Security Assessment, System Configuration, Digital Forensics
Intermediate · Course · 1 - 3 Months

Google Cloud
Skills you'll gain: Security Information and Event Management (SIEM), Security Software, Dashboard Creation, Role-Based Access Control (RBAC), Incident Management, Automation, System Configuration, Interactive Data Visualization, Integrated Development Environments, Systems Integration, Data Integration
Beginner · Course · 1 - 4 Weeks

Packt
Skills you'll gain: Vulnerability Scanning, Security Testing, Vulnerability Management, Vulnerability Assessments, Penetration Testing, Threat Modeling, Exploit development, Open Web Application Security Project (OWASP), Application Security, Exploitation techniques, Patch Management, Cybersecurity, Cyber Engineering, Technical Communication, Technical Writing
Beginner · Course · 3 - 6 Months

Coursera
Skills you'll gain: SQL, Scalability, Data Pipelines, Data Manipulation, Data Integrity, Data Validation, Data Migration, Transaction Processing, Data Transformation, Scripting, Anomaly Detection, Record Keeping, Sampling (Statistics), Cryptography, Reconciliation
Advanced · Course · 1 - 4 Weeks

University of London
Skills you'll gain: Cryptography, Cryptographic Protocols, Application Security, Cybersecurity, Data Security, Encryption, Vulnerability Assessments, Information Systems Security, Key Management, Infrastructure Security, Public Key Infrastructure, Public Key Cryptography Standards (PKCS), Authentications, Mobile Security, Data Integrity
Build toward a degree
Beginner · Course · 1 - 4 Weeks